Review the table columns available in Endpoint Inventory.
The Endpoint Inventory table contains a wide range of columns which you can choose
to show or hide from view, or change the order of. You can also use the column names
to create filters when searching for endpoints.
The following table lists the available columns in alphabetical order. The columns
might appear in a different order when you access Endpoint Inventory.
Column name
|
Description
|
Endpoint name
|
The name of the endpoint on your network
This column displays both endpoints with agents installed and unmanaged discoverable
endpoints on your network. This column cannot be hidden.
|
Advanced risk telemetry
|
The advanced risk telemetry status of the endpoint
Displays the enabled or disabled status of the feature.
|
Agent policy
|
The policy name applied to the agent installed on the endpoint
Displays the name of the policy applied to the endpoint by the Protection Manager.
|
Agent program status
|
Indicates the connectivity status of the endpoint protection features, which shows
whether features are currently online or offline
Displays the status of installed Standard Endpoint Protection and Server & Workload
Protection features.
|
Agent last connected
|
The most recent connection time for the endpoint protection agent
Displays when and how long since the agent last connected to the Protection Manager.
|
Agent update policy
|
The expected version of agent update and compliance status
Displays the assigned version rule. For example, n, n - 1, Fixed.
|
Agent update status
|
The status of the agent update schedule
Displays the Scheduled, Paused status for the agent update.
|
Agent version
|
The agent version installed on the endpoint
|
Component update policy
|
The expected version of component updates and compliance status
Displays the assigned version rule. For example, n, n - 1, n - 2.
|
Component update status
|
The status of the component update schedule
Displays the Scheduled, Paused status for the component update.
|
Credit allocation status
|
The paid endpoint security features applied to the endpoint
Displays which paid security features are applied to the endpoint. Credit allocation
for each feature is normally determined by the number of endpoints with the feature
enabled.
For more information about credit allocation, see Credit requirements for Trend Vision One apps and services.
|
CPU architecture
|
The CPU architecture running on the endpoint
|
Custom tags
|
The number of custom created tags assigned to the endpoint
|
Device services
|
Services detected on the endpoint
|
Display name
|
The display name on your network for the endpoint
|
Endpoint group
|
The group name or domain name that the endpoint belongs to
|
Endpoint GUID
|
The unique alphanumeric string that identifies the endpoint in Trend Vision One
|
Endpoint security policy
|
The endpoint security policy the endpoint is assigned to
Displays the name of the policy assigned in Endpoint Security Policies.
|
Endpoint sensor detection and response
|
The enabled/disabled status of the endpoint sensor detection and response feature
Configure endpoint sensor detection and response in Endpoint Security Policies or by using the policy override settings.
|
Endpoint Sensor version
|
The endpoint sensor version installed on the endpoint
|
Installed components
|
The compliance patterns reported from the endpoint protection product
Displays the components installed on Standard Endpoint Protection and Server & Workload
Protection managed endpoints.
|
IP address
|
The IP address of the endpoint
|
Isolation status
|
Indicates if an endpoint is isolated or not
Use Response Actions to isolate or restore endpoints.
|
Last IP used
|
The last IP address that logged on to the device
|
Last logged on user
|
The last user that logged on to the endpoint
|
Last scanned
|
The last time the endpoint protection features scanned the endpoint
Applies to Standard Endpoint Protection and Server & Workload Protection managed endpoints.
|
Original endpoint group (deprecated)
|
The endpoint sensor group name before this endpoint was upgraded to Trend Vision One
Endpoint Security
|
OS architecture
|
The operating system architecture running on the endpoint
Includes the common and specific name for the OS architecture. For example,
64-bit (x86-64) . |
OS kernel
|
The operating system kernel running on the endpoint
The specific Linux kernel. Only applies to Linux operating systems.
|
OS name
|
The name of the operating system running on the endpoint
For example, Windows 10, macOS Sonoma.
|
OS version
|
The version of the operating system running on the endpoint
The specific version and build number of the operating system. For example, a Windows
10 endpoint might display
10.0 (Build 19045) . |
Protection manager
|
The name of the Protection Manager instance that manages the agent installed on the
endpoint
Endpoints not assigned to a Protection Manager instance, such as Endpoint Sensor only
deployments, display a null (-) value.
|
Sensor connectivity
|
The connectivity of the sensor installed on the endpoint
Displays the connected or disconnected status of the endpoint sensor.
|
Sensor last connected
|
The last connection time that the sensor connected
Displays when and how long since the endpoint sensor last connected to Endpoint Inventory.
|
Service Gateway / proxy
|
The current connection method used by the endpoint
|
Version control policy
|
The name of the version control policy the endpoint is assigned to
Displays the name of the policy assigned in Version Control Policies.
|